Documente Academic
Documente Profesional
Documente Cultură
Model Questions
2. SET is
a) Electronic Payment System
b) Security Protocol
c) Credit card payment
d) Internet Payment System
12. ________ prevents either sender or receiver from denying a transmitted message.
a) Access Control
b) Non repudiation
c) Masquerade
d) Integrity
20. The Authentication Header (AH) , part of IPsec, provides which of the following security
function?
a) Source authentication
b) Data Integrity
c) Data confidentiality
d) Source authentication and data integrity
36. The process of writing the text as rows and read it as columns is known as
a) Vernam cipher
b) Caesar cipher
c) Transposition columnar cipher
d) Homophonic substitution cipher
37. The principal of _______ ensures that only the sender and the intended recipients have
access to the contents of message
a) Confidentiality
b) Authentication
c) Integrity
d) Access control
43. In polyalphabetic cipher, the characters in plaintext have a relation with the characters in
cipher text
a) One to one
b) One to many
c) Many to one
d) Many to many
44. _______ is based on the idea of hiding the relationship between the cipher text and the
Key
a) Diffusion
b) Confusion
c) Both (a) and (b)
d) None of these
46. The main goal of _____ attack is to obtain unauthorized access to the information.
a) Active
b) Caesar
c) Passive
d) Brute force
47. _____ involves trying every possible key until a proper translation of cipher text
into plain text is obtained.
a) Man in the middle attack
b) Chosen Plain text Attack
c) Brute Force attack
d) None of these
50. In______ mode, the same plaintext value will always result in the same cipher text value.
a) Cipher Block Chaining
b) Cipher Feedback
c) Electronic code book
d) Output Feedback
54. In Digital Signature, there is _____ relationship between signature and message.
a) Many to one
b) One to many
c) Many to many
d) One to one
55. When a Hash function is used to provide message authentication, the hash function value
is referred to as
a) Message digest
b) Message authentication code
c) Hashed based MAC
d) None of these
56. In ______ , the malicious code is installed on a personal computer or server misdirecting
usersto fraudulent website.
a) Phishing scam
b) Pharming scam
c) Spoofing
d) Sniffing
58. Which security protocol is used to secure pages where users are required to submit
sensitive information?
a) Secure Socket Layer
b) Transport Layer Security
c) Secure IP
d) Secure HTTP
59. The criteria which makes TLS more secure than SSL is
a) Message Authentication
b) Key material generation
c) Both (a) and (b)
d) None of these
60. The _____ mode of IPsec, take the whole IP packet to form secure communication
between two gateways
a) Transport
b) Tunnel
c) Either (a) or (b)
d) Both (a) and (b)
61. The _____ authentication factor that relate to something that a user is or does and
includes biometric identifiers.
a) Knowledge factor
b) Ownership factor
c) Inherence Factor
d) Authentication factor
62. In password selection strategy, minimum length of characters used
a) 6
b) 10
c) 8
d) 14
64. A ______ acts as a barrier between a trusted network and an untrusted network
a) Bridge
b) Router
c) Firewall
d) Both (a) and (b)
65. It monitors the TCP handshaking going on between the local and remote host to
determine whether the session being initiated is legitimate.
a) Application Layer Firewall
b) State full firewall
c) Packet firewall
d) Circuit level firewall
67. Man in the middle attack can endanger the security of Diffie Hellman method if two
parties are not
a) Joined
b) Authenticated
c) Submitted
d) Shared
70. Name the network attack that floods it with useless traffic.
a) Spoofing
b) Denial of Service attack
c) Virus
d) Trojan Horse
78. Encapsulating Security Payload (ESP) belongs to which Internet Security Protocol?
a) Secure Socket Layer Protocol
b) Secure IP Protocol
c) Secure Http Protocol
d) Transport Layer Security Protocol